Matching Items (225)
Filtering by

Clear all filters

131495-Thumbnail Image.png
Description
Criminal Justice is a complex subject matter, and not everyone agrees on the way a criminal justice system ought to function. But one feature that is common to virtually all forms of proposed justice systems is that a true justice system treats people ethically. The question, then, is how a

Criminal Justice is a complex subject matter, and not everyone agrees on the way a criminal justice system ought to function. But one feature that is common to virtually all forms of proposed justice systems is that a true justice system treats people ethically. The question, then, is how a justice system can achieve this. This investigation analyzed two ethical theories, Kantianism and Utilitarianism, to determine which one would be better suited for guiding a criminal justice system on how to treat the people involved ethically. This investigation focused on applying the two theories to the U.S. Criminal Justice System in particular.
Kantianism is a duty-based moral theory in which actions have an intrinsic moral worth. This means certain actions are morally right and other are morally wrong, regardless of the intended or realized consequences. The theory relies on the categorical imperative to judge the morality of certain actions. It states that an action is moral if its maxim can be willed universal law and if it avoids treating people as merely a means. In contrast, Utilitarianism is a consequentialist theory which focuses on the consequences of an action in judging moral worth. In Utilitarianism, the morally correct action is the one which will maximize utility; that is to say, the morally right action is the one which will produce the greatest amount of happiness and minimize the amount of pain for the greatest number of people.
After applying these two theories to moral dilemmas facing the U.S. Criminal Justice System, including the appropriate collection of DNA evidence, the use of police deception, and the use of criminal punishments such as solitary confinement or the death penalty, it was clear that Kantianism was the ethical theory best suited for guiding the system in treating people ethically. This is because Kantianism’s focus on the intrinsic moral worth of an action rather than its consequences leaves less room for ambiguity than does Utilitarianism.
ContributorsMorett, Xavier Laakea (Author) / Manninen, Bertha (Thesis director) / Kimberly, Kobojek (Committee member) / School of Criminology and Criminal Justice (Contributor) / School of Mathematical and Natural Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131525-Thumbnail Image.png
Description
The original version of Helix, the one I pitched when first deciding to make a video game
for my thesis, is an action-platformer, with the intent of metroidvania-style progression
and an interconnected world map.

The current version of Helix is a turn based role-playing game, with the intent of roguelike
gameplay and a dark

The original version of Helix, the one I pitched when first deciding to make a video game
for my thesis, is an action-platformer, with the intent of metroidvania-style progression
and an interconnected world map.

The current version of Helix is a turn based role-playing game, with the intent of roguelike
gameplay and a dark fantasy theme. We will first be exploring the challenges that came
with programming my own game - not quite from scratch, but also without a prebuilt
engine - then transition into game design and how Helix has evolved from its original form
to what we see today.
ContributorsDiscipulo, Isaiah K (Author) / Meuth, Ryan (Thesis director) / Kobayashi, Yoshihiro (Committee member) / School of Mathematical and Statistical Sciences (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131529-Thumbnail Image.png
Description
RecyclePlus is an iOS mobile application that allows users to be knowledgeable in the realms of sustainability. It gives encourages users to be environmental responsible by providing them access to recycling information. In particular, it allows users to search up certain materials and learn about its recyclability and how to

RecyclePlus is an iOS mobile application that allows users to be knowledgeable in the realms of sustainability. It gives encourages users to be environmental responsible by providing them access to recycling information. In particular, it allows users to search up certain materials and learn about its recyclability and how to properly dispose of the material. Some searches will show locations of facilities near users that collect certain materials and dispose of the materials properly. This is a full stack software project that explores open source software and APIs, UI/UX design, and iOS development.
ContributorsTran, Nikki (Author) / Ganesh, Tirupalavanam (Thesis director) / Meuth, Ryan (Committee member) / Watts College of Public Service & Community Solut (Contributor) / Department of Information Systems (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
134151-Thumbnail Image.png
Description
This paper will review past unethical studies conducted in the last 100 years on humans, including studies such as the WWII Concentration Camp studies on hypothermia and sterilization, Tuskegee Syphilis Study, and the case of Henrietta Lacks; Analyze why they were deemed unethical, the laws that emerged from these studies,

This paper will review past unethical studies conducted in the last 100 years on humans, including studies such as the WWII Concentration Camp studies on hypothermia and sterilization, Tuskegee Syphilis Study, and the case of Henrietta Lacks; Analyze why they were deemed unethical, the laws that emerged from these studies, and how it relates to contemporary technology, with a focus on the issues surrounding the development of an electronic wearable pregnancy monitor. The studies will include details of how they were conducted as well as what deemed them unethical and an explanation of why the results are unusable. Following the studies will be an explanation of the laws that were set into place following the studies with a lead into current technologies and how these technologies created a new set of ethics. The Google Mini, the wearable biosensor onesies for infants, and the intensive care unit at Banner Baywood will be described and so will their role in the development of an electronic wearable pregnancy monitor. The mini-meta analysis includes possible features of the monitor as well as a description of what the ethical consent form will look like. To conclude the paper, the importance of analyzing past unethical studies will help create a new ethical device that will make a point to go above and beyond to ensure the physical health of unborn children, in a way that is both ethical and significant.
ContributorsWallace, Sydney Sarah (Author) / Hall, Rick (Thesis director) / Kamenca, Andrea (Committee member) / Human Systems Engineering (Contributor) / Arizona State University. College of Nursing & Healthcare Innovation (Contributor) / Barrett, The Honors College (Contributor)
Created2017-12
134157-Thumbnail Image.png
Description
This paper details the specification and implementation of a single-machine blockchain simulator. It also includes a brief introduction on the history & underlying concepts of blockchain, with explanations on features such as decentralization, openness, trustlessness, and consensus. The introduction features a brief overview of public interest and current implementations of

This paper details the specification and implementation of a single-machine blockchain simulator. It also includes a brief introduction on the history & underlying concepts of blockchain, with explanations on features such as decentralization, openness, trustlessness, and consensus. The introduction features a brief overview of public interest and current implementations of blockchain before stating potential use cases for blockchain simulation software. The paper then gives a brief literature review of blockchain's role, both as a disruptive technology and a foundational technology. The literature review also addresses the potential and difficulties regarding the use of blockchain in Internet of Things (IoT) networks, and also describes the limitations of blockchain in general regarding computational intensity, storage capacity, and network architecture. Next, the paper gives the specification for a generic blockchain structure, with summaries on the behaviors and purposes of transactions, blocks, nodes, miners, public & private key cryptography, signature validation, and hashing. Finally, the author gives an overview of their specific implementation of the blockchain using C/C++ and OpenSSL. The overview includes a brief description of all the classes and data structures involved in the implementation, including their function and behavior. While the implementation meets the requirements set forward in the specification, the results are more qualitative and intuitive, as time constraints did not allow for quantitative measurements of the network simulation. The paper concludes by discussing potential applications for the simulator, and the possibility for future hardware implementations of blockchain.
ContributorsRauschenbach, Timothy Rex (Author) / Vrudhula, Sarma (Thesis director) / Nakamura, Mutsumi (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2017-12
135228-Thumbnail Image.png
Description
What's in a name? A person not a number is a multimedia eBook that will explore how the media treats coverage of sexual assault victims and challenges the traditional no-naming policy instilled in almost every professional newsroom. Historical context to no-naming policies, opinions from critics of the no-naming policy and

What's in a name? A person not a number is a multimedia eBook that will explore how the media treats coverage of sexual assault victims and challenges the traditional no-naming policy instilled in almost every professional newsroom. Historical context to no-naming policies, opinions from critics of the no-naming policy and legal information will be provided. This book serves to encourage journalists and editors to consider identifying victims after long, thoughtful discussions, to educate media consumers on the topic, to eradicate the societal stigma of rape, and to reflect the views of survivors so that they may feel more willing to share their stories. Identifying sexual assault victims conforms to the journalistic imperative to tell the truth as fully as possible and to inform the public as completely as possible. When the information is part of the public record and there are no legal limitations on its use, identifying sexual assault victims will have a positive impact in educating the public and eradicating the stigma associated with being the victim of sexual assault. This book proposes that through educated, thoughtful and truthful stories about sexual assault can spark careful conversations and help turn around the stigma our society has placed on victims. The full eBook, complete with photos, videos and other audio components, is available at https://alejandraarmstrong.atavist.com/whats-in-a-name-a-person-not-a-number.
ContributorsArmstrong, Alejandra Moya (Author) / Gilger, Kristin (Thesis director) / Petchel, Jacqueline (Committee member) / Walter Cronkite School of Journalism and Mass Communication (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
134286-Thumbnail Image.png
Description
Many researchers aspire to create robotics systems that assist humans in common office tasks, especially by taking over delivery and messaging tasks. For meaningful interactions to take place, a mobile robot must be able to identify the humans it interacts with and communicate successfully with them. It must also be

Many researchers aspire to create robotics systems that assist humans in common office tasks, especially by taking over delivery and messaging tasks. For meaningful interactions to take place, a mobile robot must be able to identify the humans it interacts with and communicate successfully with them. It must also be able to successfully navigate the office environment. While mobile robots are well suited for navigating and interacting with elements inside a deterministic office environment, attempting to interact with human beings in an office environment remains a challenge due to the limits on the amount of cost-efficient compute power onboard the robot. In this work, I propose the use of remote cloud services to offload intensive interaction tasks. I detail the interactions required in an office environment and discuss the challenges faced when implementing a human-robot interaction platform in a stochastic office environment. I also experiment with cloud services for facial recognition, speech recognition, and environment navigation and discuss my results. As part of my thesis, I have implemented a human-robot interaction system utilizing cloud APIs into a mobile robot, enabling it to navigate the office environment, identify humans within the environment, and communicate with these humans.
Created2017-05
134293-Thumbnail Image.png
Description
Lie detection is used prominently in contemporary society for many purposes such as for pre-employment screenings, granting security clearances, and determining if criminals or potential subjects may or may not be lying, but by no means is not limited to that scope. However, lie detection has been criticized for being

Lie detection is used prominently in contemporary society for many purposes such as for pre-employment screenings, granting security clearances, and determining if criminals or potential subjects may or may not be lying, but by no means is not limited to that scope. However, lie detection has been criticized for being subjective, unreliable, inaccurate, and susceptible to deliberate manipulation. Furthermore, critics also believe that the administrator of the test also influences the outcome as well. As a result, the polygraph machine, the contemporary device used for lie detection, has come under scrutiny when used as evidence in the courts. The purpose of this study is to use three entirely different tools and concepts to determine whether eye tracking systems, electroencephalogram (EEG), and Facial Expression Emotion Analysis (FACET) are reliable tools for lie detection. This study found that certain constructs such as where the left eye is looking at in regard to its usual position and engagement levels in eye tracking and EEG respectively could distinguish between truths and lies. However, the FACET proved the most reliable tool out of the three by providing not just one distinguishing variable but seven, all related to emotions derived from movements in the facial muscles during the present study. The emotions associated with the FACET that were documented to possess the ability to distinguish between truthful and lying responses were joy, anger, fear, confusion, and frustration. In addition, an overall measure of the subject's neutral and positive emotional expression were found to be distinctive factors. The implications of this study and future directions are discussed.
ContributorsSeto, Raymond Hua (Author) / Atkinson, Robert (Thesis director) / Runger, George (Committee member) / W. P. Carey School of Business (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
134294-Thumbnail Image.png
Description
Global violent conflict has become an increasing problem in recent decades, especially in the African continent. Civil wars, terrorism, riots, and political violence has wrought havoc not only on civilian lives, but also on economic foundations. Trade networks are a way to measure these economic foundations. To summarize trade networks

Global violent conflict has become an increasing problem in recent decades, especially in the African continent. Civil wars, terrorism, riots, and political violence has wrought havoc not only on civilian lives, but also on economic foundations. Trade networks are a way to measure these economic foundations. To summarize trade networks clustering coefficient as well as trade quantity/value summation measures are used. To understand effects of global trade on violent conflict, Pearson product-moment correlations are utilized. This work details a comparison of African national economies and violent conflict events using clustering coefficient, trade summation measures and Pearson correlation coefficient.
ContributorsKadambi, Sagarika Sanjay (Author) / Maciejewski, Ross (Thesis director) / Shutters, Shade (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
135388-Thumbnail Image.png
Description
Abstract. The term "sex trafficking" can mean many different things, depending on who uses it. To some, it may be synonymous with prostitution. To others, it may equate to slavery. And some may find that sex trafficking differs from both slavery and prostitution. But I find that the term "sex

Abstract. The term "sex trafficking" can mean many different things, depending on who uses it. To some, it may be synonymous with prostitution. To others, it may equate to slavery. And some may find that sex trafficking differs from both slavery and prostitution. But I find that the term "sex trafficking" is used improperly when referring to phenomena that may not entail the violation of rights of any individual involved. For this reason, various definitions of "sex trafficking" may inappropriately conflate sex trafficking with prostitution. In this essay, I argue against such a conflation through supporting a rights-based approach of defining "sex trafficking," in which every instance of true sex trafficking necessitates a violation of someone's rights. First, I begin by laying the foundation of my discussion with definitions and various government and non-government uses of the term "sex trafficking." Then, I argue for the rights-based approach. I proceed to explore how the rights-based approach relates to consent, force, coercion, deception, and competence. Then, I compile my findings, synthesize a definition, and elaborate on a few questions regarding my definition. Using the term "sex trafficking" correctly, as I argue, means that we necessarily use the term in a context of a violation of rights.
ContributorsMiller, Isaac Jonathan (Author) / de Marneffe, Peter (Thesis director) / McGregor, Joan (Committee member) / School of Historical, Philosophical and Religious Studies (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05